27 research outputs found

    Echocardiography‐Based Selection of Quiescent Heart Phases

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/135456/1/jum200524111519.pd

    Integrating Security in the MAC Layer of WDM Optical Networks

    No full text
    We introduce a new technique for providing security in a broadcast-and-select, wavelength-division-multiplexed (WDM) optical network. The approach provides privacy of communications by employing a novel challenge-response scheme and exploiting the tuning delay inherent in optical receivers. The proposed technique can be integrated easily into any existing WDM media-access-control (MAC) protocol that employs tunable receivers. The modi ed protocol would require every idle user, who is not scheduled to receive data, to tune in to a channel that does not contain sensitive data. A violation of the protocol can be detected with very high probability, and appropriate measures can be taken against the violator. The technique provides features that cannot be achieved with cryptography alone. Significant benefits of the proposed approach include the ability to detect security violations as they occur, and an efficient mechanism to provide privacy for multicast transmissions

    Echocardiography-Based Selection of Quiescent Heart Phases

    No full text
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/135456/1/jum200524111519.pd

    Integrating Security in the MAC Layer of WDM Optical Networks*

    Full text link
    We introduce a new technique for providing security in a broadcast-and-select, wavelength-division-multiplexed (WDM) optical network. The approach provides privacy of communications by employing a novel challenge-response scheme and exploiting the tuning delay inherent in optical receivers. The proposed technique can be integrated easily into any existing WDM media-access-control (MAC) protocol that employs tunable receivers. The modified protocol would require every idle user, who is not scheduled to receive data, to tune in to a channel that does not contain sensitive data. A violation of the protocol can be detected with very high probability, and appropriate measures can be taken against the violator. The technique provides features that cannot be achieved with cryptography alone. Significant benefits of the proposed approach include the ability to detect security violations as they occur, and an efficient mechanism to provide privacy for multicast transmissions. We develop two simple solutions to deal with different levels of attack: (1) eavesdroppers working alone, and (2) eavesdroppers working in collaboration. We also introduce a dynamic channel allocation scheme that can further reduce the number of required overhead channels, with minimal loss in the capability to detect eavesdropping violations.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/47531/1/11107_2004_Article_387586.pd

    # 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. Integrating Security in the MAC Layer of WDM Optical Networks*

    No full text
    Abstract. We introduce a new technique for providing security in a broadcast-and-select, wavelength-division-multiplexed (WDM) optical network. The approach provides privacy of communications by employing a novel challenge-response scheme and exploiting the tuning delay inherent in optical receivers. The proposed technique can be integrated easily into any existing WDM media-access-control (MAC) protocol that employs tunable receivers. The modi®ed protocol would require every idle user, who is not scheduled to receive data, to tune in to a channel that does not contain sensitive data. A violation of the protocol can be detected with very high probability, and appropriate measures can be taken against the violator. The technique provides features that cannot be achieved with cryptography alone. Signi®cant bene®ts of the proposed approach include the ability to detect security violations as they occur, and an ef®cient mechanism to provide privacy for multicast transmissions. We develop two simple solutions to deal with different levels of attack: (1) eavesdroppers working alone, and (2) eavesdroppers working in collaboration. We also introduce a dynamic channel allocation scheme that can further reduce the number of required overhead channels, with minimal loss in the capability to detect eavesdropping violations

    Approximate Bounds and Expressions for the Link Utilization of Shortest-Path Multicast Network Traffic

    No full text
    Multicast network traffic is information with one source node, but many destination nodes. Rather than setting up individual connections between the source node and each destination node, or broadcasting the information to the entire network, multicasting efficiently exploits link capacity by allowing the source node to transmit a small number of copies of the information to mutually-exclusive groups of destination nodes. Multicasting is an important topic in the fields of networking (video and audio conferencing, video on demand, local-area network interconnection) and computer architecture (cache coherency, multiprocessor message passing). In this paper, we derive approximate expressions for the minimum cost (in terms of link utilization) of shortestpath multicast traffic in arbitrary tree networks. Our results provide a theoretical best-case scenario for link utilization of multicast distribution in tree topologies overlaid onto arbitrary graphs. In real networks such as the Interne..

    Integrating Security in the MAC Layer of WDM Optical Networks

    No full text
    We introduce a new technique for providing security in a broadcast-and-select, wavelengthdivision -multiplexed (WDM) optical network. The approach provides privacy of communications by employing a novel challenge-response scheme and exploiting the tuning delay inherent in optical receivers. The proposed technique can be integrated easily into any existing WDM media-accesscontrol (MAC) protocol that employs tunable receivers. The modified protocol would require every idle user, who is not scheduled to receive data, to tune in to a channel that does not contain sensitive data. A violation of the protocol can be detected with very high probability, and appropriate measures can be taken against the violator. The technique provides features that cannot be achieved with cryptography alone. Significant benefits of the proposed approach include the ability to detect security violations as they occur, and an efficient mechanism to provide privacy for multicast transmissions. We devel..
    corecore